Cloudmon supports two multi-factor authentication methods: an OTP authenticator app and email OTP. Both are configured per user from the Edit Profile page.
Authentication in Cloudmon is based on a username and password at first login, with the option to enable multi-factor authentication as an additional security layer. When MFA is enabled, users must provide a second verification code in addition to their password at every login. Cloudmon supports two MFA methods and users can choose the one that best fits their workflow.
The OTP authenticator app method generates a time-based one-time password (TOTP) using an app installed on the user's mobile device. The code refreshes every 30 seconds and is required at each login after the password is entered. Any TOTP-compatible authenticator app can be used, including Google Authenticator, Microsoft Authenticator, and Authy.
This method is recommended for users with consistent access to their mobile device, as it works without an internet connection on the device once set up. See MFA for setup steps.
The email OTP method sends a one-time password to the user's registered email address at each login. The user enters this code to complete the authentication. This method does not require a mobile device or a separate app, making it a simpler option for users who prefer not to use an authenticator app.
Email OTP requires the user to have access to their registered email inbox at the time of each login. See MFA for setup steps.
| Consideration | OTP Authenticator App | Email OTP |
| Requires mobile device | Yes | No |
| Requires internet at login | No (app works offline) | Yes (to receive email) |
| Code delivery | Generated locally on device | Sent to registered email |
| Recommended for | Users with consistent mobile access who want the highest security | Users who prefer a simpler setup without a separate app |